TrustedID Discusses Identity Theft Protection and the Best Ways to Protect Your Identity

PALO ALTO, Calif., Aug. 20, 2012 /PRNewswire/ -- For too long, consumers have fallen victim to a credit industry which offers little information and fewer consumer rights--and which distributes and sells consumer information with little regard for the individual. Now, the leading identity theft protection company is helping with tips on credit monitoring and identity protection.

"At TrustedID, we're working on multiple fronts to help empower and protect you, the consumer," said a TrustedID representative. "You, and only you, should determine who sees your personal information and who can gain access to it. We're also constantly creating new products and services to allow consumers the ability to manage their personal information, and to protect themselves, in the strongest way possible, from America's fastest growing crime, identity theft."

Place a freeze on your credit report - CreditLock from TrustedID provides the maximum security for your identity by placing a freeze on your credit report. With this in place, the three major credit bureaus cannot release your credit report to third parties without your permission. Because creditors won't grant new credit until they can see your credit report, identity thieves can't open new accounts in your name.

Data breach defense for companies – Identity theft affects companies too! With data breaches averaging $6.3 million per incident and becoming more costly each year, TrustedID's Data Breach Defense services can lower costs and help manage risk in the event of a data breach in your organization.

For more information on protecting your identity with TrustedID, visit www.TrustedID.com.

About TrustedID:

TrustedID delivers privacy, security and reputation management services to proactively help protect against credit and identity theft – safeguarding individuals, families and businesses. TrustedID provides consumers with the power and resources to manage and protect their credit and personal information, as well as who has access to that information.